Vulnerability Description
Medtronic MyCareLink Smart 25000 contains an authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient’s smartphone to authenticate to the patient’s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Medtronic | Mycarelink Smart Model 25000 Firmware | All versions |
| Medtronic | Mycarelink Smart Model 25000 | - |
Related Weaknesses (CWE)
References
- https://global.medtronic.com/xg-en/product-security/security-bulletins/mycarelin
- https://www.cisa.gov/news-events/ics-medical-advisories/icsma-20-345-01
- https://us-cert.cisa.gov/ics/advisories/icsma-20-345-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-25183?
CVE-2020-25183 is a vulnerability with a CVSS score of 8.0 (HIGH). Medtronic MyCareLink Smart 25000 contains an authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobil...
How severe is CVE-2020-25183?
CVE-2020-25183 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25183?
Check the references section above for vendor advisories and patch information. Affected products include: Medtronic Mycarelink Smart Model 25000 Firmware, Medtronic Mycarelink Smart Model 25000.